Connecting the logs with event correlation

Starting with the basics Security information and event management (SIEM) helps with managing and analyzing the vast amount of log information generated by networks. Of all the capabilities of SIEM, event correlation...

EventLogAnalyzer 2 min read Read

Reporting on and auditing your Office 365 environment

Migrating to Office 365 can seem like an immense task, but making the switch itself is just the tip of the iceberg. The real challenge with Office 365 is keeping tabs...

IT Security 2 min read Read

Migrating HTTP to HTTPS: A top priority in 2018

Starting July 2018 with the release of Chrome browser version 68, Google Chrome will start marking all HTTP sites with a “Not secure” badge, even those that don’t deal...

Key Manager Plus 2 min read Read

Expired SSL certificate shuts down Oculus headsets around the world 

Thousands upon thousands of affected Oculus Rifts was the last thing Oculus VR—a division of Facebook Inc. and developer of the Oculus Rift—wanted to wake up to. But after letting just...

Key Manager Plus 2 min read Read

GDPR prep steps—Part 1

The deadline for the General Data Protection Regulation (GDPR) is looming closer. Are you ready? In this two-part blog series, we’ll discuss the steps you can take to prepare for the...

IT Security 2 min read Read

Talk to our experts about the essentials of log management

Log management is a pillar of security information and event management (SIEM), and is critical to any organization’s security strategy. Logs document every event that occurs on your...

EventLogAnalyzer 2 min read Read

Gold Lowell uses SamSam ransomware to terrorize SMBs

From late December 2017 to mid January 2018, several small and medium businesses found themselves the victims of SamSam ransomware, in attacks propagated by the Gold...

IT Security 2 min read Read

A reminder to focus on securing your databases and web servers 

The trend of global cyberattacks has continued into February. In California, The Sacramento Bee recently experienced a ransomware attack on its databases, exposing the voter registration details...

IT Security 2 min read Read

How to prioritize your top security alerts for better SIEM

Receiving alerts when a critical event occurs is the first step in responding to a security incident. But as any security expert knows, analyzing log data can get chaotic when you...

IT Security 1 min read Read